AI coding agents run shell commands with no audit trail. I built a fix

oculisecurity.com · rellaElla · 5 days ago · view on HN · authentication
0 net
Tags
jwt
Oculi — A Security Layer for AI Coding Agents Early Access Program Your AI agents have no security controls. That changes now. Engineers across your org are using AI coding agents that execute shell commands, modify code, and access internal systems. Oculi gives security teams full visibility, policy enforcement, and audit trails for every agent action. Apply for Early Access We're working with a small number of security teams. Limited spots available. Architecture Overview AI Agents Claude Code, Cursor, Windsurf Oculi Intercept & Enforce Policy Engine Audit Log How It Works How Oculi works Oculi sits between your AI agents and your infrastructure, giving security teams control without disrupting engineering velocity. 01 Deploy alongside your agent tooling Oculi integrates with Claude Code, Cursor, and Windsurf in minutes. No changes to developer workflows. No SDK integration required. IDE Integrations 2 connected CC Claude Code PreToolUse, PostToolUse, Stop hooks active Connected Cu Cursor PreToolUse, PostToolUse, Stop hooks active Connected Ws Windsurf Not configured Setup 02 Define what agents can and cannot do Set enforceable policies for your organization. Control shell access, file operations, network calls, and MCP tool usage. Policies are version-controlled and auditable. Policy Rules 3 rules active Rule ID Tool Pattern Action no-rm-rf Shell rm\s+-rf Deny warn-env-access File Read \.env Warn block-external-mcp MCP Call external://* Deny 03 Complete audit trail from day one Every agent action is captured with full context: what was attempted, which policy applied, and whether it was allowed or denied. Ready for security reviews, compliance audits, and incident investigations. Activity Report Last 24 hours 142 Total Events 3 Denied 7 Warnings Events by Tool Shell 52 File Read 38 File Edit 31 MCP Call 17 Why Now AI coding agents are being adopted faster than security controls can keep up. Most organizations have no policy governing what these agents are allowed to do. Oculi exists for security teams that need to get ahead of this before an incident forces the conversation. Capabilities Built for security teams Governance, compliance, and risk controls purpose-built for AI agent activity across your organization. Centralized Security Gateway Org-wide policy management, JWT authentication, and rate limiting. A single control plane for every AI agent across your engineering organization. Enforceable Security Policies Version-controlled policies that define what every agent in your org can and cannot do. Auditable, repeatable, and consistent across teams. Complete Audit Trail Full record of every agent action for security reviews, compliance requirements, and incident investigations. Structured logs with policy match context. Command Execution Controls Enforce boundaries on what shell commands agents can run. Prevent unauthorized operations before they execute. File and Credential Protection Control agent access to sensitive files, environment variables, and credentials. Automated alerts on policy violations. Third-Party Tool Governance Manage which external tools and services agents can access. Prevent unauthorized network calls and data exfiltration. Integrations Coverage across your agent stack Oculi provides a single security layer across every AI coding agent your engineers use. One policy set, consistent enforcement. Claude Code Full interception and policy enforcement for Claude Code agents across your engineering teams. Cursor Consistent security controls for Cursor-based development environments. Windsurf Policy enforcement and audit logging for Windsurf agent activity. Any MCP Client Extend coverage to any agent that implements the Model Context Protocol. Apply for early access We're working with a small cohort of security teams to shape the product. If you're responsible for securing AI agent usage at your organization, we'd like to talk. Apply for Early Access Limited to qualified security teams. We'll follow up within 48 hours.